Customer API Tokens
Create a Customer Token to access customer-specific data or execute sensitive actions (related to funds movement). Customer Tokens only allow access to resources that are associated with the specific customer the token was created for. A customer token is valid for up to 24 hours (customizable by setting the expiresIn field).
In order to create a new customer token that has access to sensitive scopes, the customer must be taken through two factor authentication (one-time password) or to supply Json Web Token. The flow of API calls will be:
Call create customer token verification
You get a verification token in the response
The customer receives a one-time password
The customer types the password into your UI
Call create customer token and provide the verificationToken you received in step #2 and verificationCode you received in step #4. You receive a new customer token in response.
In order to avoid repeat customer authentications, you may store the customer token and re-use it until it expires. The recommended way to store the customer token is on the customer's device, using the browser's local storage.
Create Customer Token
Create a bearer token for a particular customer. The returned token can be used in the Authorization header as a secure alternative to the broader API token.
A Customer Token can only interact with resources under a particular customer. As an example, calling List Transactions with a customer bearer token will return only transactions within accounts under that particular customer.
Verb
POST
Url
https://api.s.usemansar.xyz/customers/:customerId/token
Required Scope
customer-token-write
Data Type
customerToken
Timeout (Seconds)
5
Example Request (two-factor authentication not required):
Attributes
scope
string
list of Scopes separated by spaces.
verificationToken
string
Required if scope includes a scope which require two-factor authentication. Received as a response from Create Customer Token Verification.
verificationCode
string
Required if the scope attribute includes a scope which requires two-factor authentication. 6 digits code sent to the customer through the desired channel.
expiresIn
integer
Optional. The lifetime of the token (in seconds). Maximum value is 86400 (24 hours). Default value is also 24 hours.
resources
Array of RestrictedResource
Optional. Restrict token to one or more specific resources. To one or many cards and/or to one or many accounts (cards under it, payments, transactions).
upgradableScope
string
Optional. list of Scopes separated by spaces. The customer will be able to upgrade the token to the scopes you provide here.
Listing all accounts of a customer:
Example Request (two-factor authentication required)
Response
Response is a JSON:API document.
201 Created
data.attributes.token
string
The token issued for the customer.
data.attributes.expiresIn
integer
The lifetime of the token (in seconds).
Example Response:
Create Customer Token Verification
In order to increase security and prevent token theft, Mansar supports two-factor authentication when creating a customer token.
When creating a customer token that contains a scope that requires two-factor authentication (see Scopes), it is required to first create a verification challenge that will be sent to the customer.
The challenge is a six-digit code and is valid for 10 minutes after its creation.
Verb
POST
Url
https://api.s.usemansar.xyz/customers/:customerId/token/verification
Required Scope
customers
Data Type
customerTokenVerification
Timeout (Seconds)
5
Attributes
channel
string
Send a verification code to the customer through one of the following channels - sms or call.
phone
Phone
Optional. This allows providing the phone number of one of the customer's authorized users. The provided phone must match an authorized user phone and will be used in the One Time Password (OTP) authentication process instead of the business customer contact's phone.
appHash
string
Optional. For sms verifications only, 11-character hash string that identifies your app. Appended at the end of your verification SMS body the way that client-side SMS Retriever API expects.
language
string
Optional. Select the verification language using a 2-letters code. Default is English. See Localization Options bellow for the support languages and their 2-letters code.
Create a token verification:
201 Created
verificationToken
string
The generated verification token . It should be passed back to Create Customer Bearer Token along with the verification code the customer received on the specified channel
Localization Options
English-en, Afrikaans-af, Arabic-ar, Catalan-ca, Chinese-zh, Chinese (Mandarin)-zh-CN, Chinese (Cantonese)-zh-HK, Croatian-hr, Czech-cs, Danish-da, Dutch-nl, English (British)-en-GB, Estonian-et, Finnish-fi, French-fr, German-de, Greek-el, Hebrew-he, Hindi-hi, Hungarian-hu, Indonesian-id, Italian-it, Japanese-ja, Kannada-kn, Korean-ko, Malay-ms, Marathi-mr, Norwegian-nb, Polish-pl, Portuguese - Brazil-pt-BR, Portuguese-pt, Romanian-ro, Russian-ru, Slovak-sk, Spanish-es, Swedish-sv, Tagalog-tl, Telegu-te, Thai-th, Turkish-tr, Vietnamese-vi
Example Response:
Create Customer Token Using JWT
Option to generate a customer token without Token Verification step.
Prerequisites:
JWT public key should be available through the provider's JWKS endpoint.
Org Settings should contain JWKs path - Customizing the jwks path is done through the Unit Dashboard (under Org Settings > JWT Settings).
In case the issuer can be different from the one that can be inferred from the jwks path, add it also to the JWT Settings according to the authentication provider as described below so Unit will be able to validate the token issuer (the
issclaim): When usingAuth0and Custom Domain is defined, set also a Custom Domain field. When usingStytchand your Issuer is not in the following template:stytch.com/PROJECT_ID, please provide the correct one under the Issuer field. When usingOktaand your Issuer is not an Okta url, please provide the correct issuer under the Issuer field.Add JWT subject to the relevant Customer - can be done through ApplicationFormPrefill, Application creation or patch Customer: Individual - Must contain at least one: jwtSubject field or AuthorizedUser's jwtSubject field. Business - Must contain at least one: Contact's jwtSubject field or AuthorizedUser's jwtSubject field.
Attributes
scope
string
list of Scopes separated by spaces.
jwtToken
string
Required if scope includes a scope which require two-factor authentication. Should be in a valid JWT structure.
Example Request (JWT):
Response
Same as Create Customer Token response.
Testing
In Sandbox, Mansar will not send a text message, in order to avoid breaching the electronic communications consent requirements. In order to create a customer token that has access to scopes that require two-factor authentication, please use the passcode 000001.
How-To Guides
Below are common use cases for using a customer token and steps you’ll need to follow to build them:
Allowing a customer to view their Prepaid cards
Example: Your application contains a page that displays the customer's Prepaid cards.
Follow these steps:
Call the Create customer token with the
cardsscope included.Call the List Cards operation and pass the customer token received in step #1 in the request
Authorizationheader. No need to pass thefilter[customerId]parameter since the token handles the filtering.
Listing all cards of a customer example:
Allowing a customer to create a new debit card (requires two-factor authentication)
Example: Your application contains a page that enables debit card creation.
Follow these steps:
The customer clicks the
Create Prepaid Cardbutton on their cards application page.Call the Create Customer Token Verification. This will return a verification token and will send the customer a verification code.
Allow the customer to enter the verification code they received.
Call the Create customer token with the
cards-writescope included as well as theverification tokenreceived in step #2 and theverification codeentered by the customer in step #3.Call the Create Individual Prepaid Card and pass the customer token received in step #4 in the request
Authorizationheader.
Creating a new debit card example:
Last updated